Exploitation of SonicWall SSL VPN Vulnerability and Misconfigurations by Akira Ransomware Group on the Rise

September 11, 2025

Cybersecurity threats linked to the Akira ransomware group have intensified, specifically targeting SonicWall devices for initial breaches. Rapid7 has reported a notable increase in attacks on SonicWall appliances, coinciding with heightened Akira ransomware activity noted since late July 2025. SonicWall recently identified that these SSL VPN attacks exploit a year-old security vulnerability (CVE-2024-40766, CVSS score: 9.3) where local user passwords remained unchanged during migration. “We are seeing a surge in attempts by threat actors to brute-force user credentials,” the company commented. To mitigate risks, they advise enabling Botnet Filtering to block known threats and implementing Account Lockout policies. SonicWall also urged users to review LDAP SSL VPN Default User Groups, highlighting that misconfigurations could represent a “critical weak point.”

SonicWall SSL VPN Vulnerabilities Targeted by Akira Ransomware Group

On September 11, 2025, cybersecurity experts reported a significant uptick in cyber intrusions targeting SonicWall devices, particularly those involving the SSL VPN feature. This surge is attributed to ongoing attacks by the Akira ransomware group, which has recently intensified its efforts since July 2025. Rapid7, a cybersecurity firm, detailed how these vulnerabilities are being exploited, specifically noting the involvement of a serious security flaw identified as CVE-2024-40766, which carries a CVSS score of 9.3.

The flaw in question stems from a failure to reset local user passwords during a migration process, enabling threat actors to exploit persisted credentials. SonicWall has confirmed that attackers are increasingly utilizing brute-force tactics to gain unauthorized access. The firm has urged its clients to adopt critical security measures, including enabling Botnet Filtering to counteract known malicious actors and enforcing Account Lockout policies to mitigate the risks associated with credential stuffing attacks.

In its advisory, SonicWall characterized certain configurations within the LDAP SSL VPN Default User Groups as particularly vulnerable if not properly managed. This misconfiguration could serve as an entry point for cybercriminals, further exacerbating the potential for unauthorized access.

The Akira ransomware group, which is believed to be based in a region known for its cybercrime activities, continues to leverage these vulnerabilities to infiltrate enterprises, posing a considerable threat to organizations that rely on SonicWall technologies. The group employs a variety of techniques outlined in the MITRE ATT&CK framework. Initial access techniques, such as brute-force credential guessing and exploiting known vulnerabilities, are paramount in their operational strategy, further underscoring the importance of stringent security measures.

To prevent such attacks, businesses utilizing SonicWall appliances are encouraged to routinely audit their configurations, particularly the setup of VPN services and user accounts. By doing so, organizations can fortify their defenses and reduce their exposure to emerging threats.

As the cyber landscape evolves, it is essential for business owners to remain vigilant and informed about the latest security vulnerabilities and attack vectors. Adopting proactive measures and understanding the tactics employed by adversaries like the Akira group is key to safeguarding sensitive data and maintaining operational integrity.

The ongoing situation serves as a critical reminder of the vulnerabilities that can exist within commonly used technologies and the importance of ongoing risk assessment and management in today’s digital environment. Organizations should take immediate steps to bolster their cybersecurity postures, ensuring they remain resilient against potential ransomware threats.

Source link